Feeds

Police data leak case clashes with Durant judgment

Jilted lover's sister traces policeman-ex

Beginner's guide to SSL certificates

A police employee has been found guilty of using police systems to pass on information about a policeman to his jilted lover. Jacqueline Rooney breached the Data Protection Act, the criminal appeals court found.

The judgment clashes with a recent verdict which seemed to define personal information very narrowly, according to a lawyer specialising in data protection law. Sue Cullen, of Pinsent Masons, the law firm behind OUT-LAW, said that the Rooney case depended on a fairly broad definition of personal information.

A previous case had involved an individual, Michael Durant, who sought to use the Data Protection Act to obtain copies of information held about himself by the Financial Services Authority (FSA). Cullen said that in that case the definition of what constituted personal information was much more narrowly drawn than in Rooney's case.

"When it was someone looking for information from the FSA it was a narrow definition: the court said 'no, that is not personal information'," said Cullen. "But when it is a criminal case involving misuse of personal data the court used a very wide definition of personal data, which is interesting."

Rooney worked in human resources for Staffordshire Police where she had access to personal information about employees which the force needed for police-related purposes. Rooney's sister was in a relationship with one of the police officers, Adam Syred.

When that relationship broke down and Syred moved in with another officer Rooney looked up the couple's address and told her sister that they had moved to Tunstall. The sister then telephoned Syred to say that she knew about the move.

Rooney argued that although she had checked the information on the system it was as part of her duties and that she did not pass the information on to her sister. A jury at Birmingham Crown Court convicted her and she appealed. The Criminal Appeals Court has just dismissed her appeal.

Cullen said that this judgment appeared to clash with that in the case of Durant, who lost his case in 2003. In that case he sought copies of information held on him by the FSA. The court found in the FSA's favour, supporting its case for a narrow interpretation of what constitutes personal data, and therefore a lighter information provision burden for organisations.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Intelligent flash storage arrays

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.